Friday, October 20, 2017

Key Reinstallation Attacks (KRACK)

Wapack Labs has identified a new research paper regarding a Key Reinstallation Attack (KRACK),  a cryptographic attack that can be used to attack all modern Android and Linux-based Wi- Fi routers utilizing the WPA2 protocol - 41% of Android devices are vulnerable to this type of attack. If the attacker is within range of the victim's Wi-Fi, KRACK makes it possible to inject and manipulate data and eavesdrop on communications. This is done by tricking the devices to re-install a zero value for the encryption key. This attack is carried out against the 4-way handshake of the WPA2 protocol. When a client connects to a network, a 4-way handshake between the client and server (router) is performed. A fresh encryption key is then issued and used to encrypt all subsequent traffic. A KRACK attacker tricks the victim into re-installing an already-in-use key. By replaying the cryptographic handshake messages, the cryptographic keys can be re-used. Wapack Labs has observed Linux patches being released and expects major distributions to have updates within the next 24-48 hours. As of yet, there is no available Proof-of-Concept (PoC) code or scanners for this vulnerability. Microsoft has issued a patch, but Apple has not yet publicly addressed this vulnerability. Many router manufacturers have issued public statements, yet no patch information has been provided. An additional concern is that many variations of operating systems are maintained by countless distributors, making the release of patch information a complicated task...READ MORE

Wapack Labs has cataloged and reported on cryptographic attacks in the past. An archive of related reporting can be found in the Red Sky Alliance portal. 

Cyber Threats Affecting Mauritania, Senegal, and Algeria

Cyber-crime in Africa is most often associated with the well-known 419 email scams. Although these fraud-motivated phishing tactics, particularly from West African threat actors, are still a major contributor to cyber-crime in this region, emerging Internet markets in these countries have led to an increase in more sophisticated hacking operations. A recent INTERPOL survey showed that West African cybercriminals make an average $2.7 million from fraud-based cyber-attacks targeting businesses and corporations and as much as $422,000 from individuals. As the Internet becomes more accessible, governments and businesses in this region who are growing their online presence will become prime targets for cybercrime due to the substantial payout and poor security measures. Wapack Labs recommends clients be aware of cyber threats when conducting business in this region and continue to track and monitor campaigns and threat actors in these countries. This report provides details on cyber threats affecting three North and West African countries, Mauritania, Senegal, and Algeria, including Wapack Labs reporting on actors and campaigns involving these countries, data trends, and implemented cyber legislation...READ MORE

Wapack Labs has cataloged and reported on geopolitical factors and cybercrime trends in the past. An archive of related reporting can be found in the Red Sky Alliance portal. 

Wednesday, October 18, 2017

Iranian Cyber Campaign Evolutions – The Next Wave: Greenbug and Ismdoor

Greenbug is an Advanced Persistent Threat (APT) cyber-espionage group with suspected Iranian ties. In August 2017, a Greenbug tool dubbed Ismdoor resurfaced in the wild. The malware possesses many reconnaissance capabilities, and in August of 2016 was deployed to harvest account credentials prior to an attack against Saudi Arabian infrastructure. Wapack Labs assesses with moderate confidence that the presence of Ismdoor is an indicator that Greenbug may be performing reconnaissance for a future campaign. While the Greenbug group is not directly affecting the membership, the targeting of Middle Eastern gas and energy companies affects multiple supply chains with repercussions for U.S. and Allied interests in the region. Wapack Labs’ analysts have also detected an evolution in Iranian cyber campaigns indicating likely adoption of cyber espionage and cyber hacktivism models similar to those employed by the Chinese APT groups, whereby different groups are utilized in different campaigns and multiple teams conduct separate phases of a cyber campaign. The Iranian originated campaigns, similar to the Chinese APT model, are also conducted in waves. The resurgence of Greenbug and Ismdoor indicate another Iranian based cyber campaign cycle is being initiated in the Middle East...READ MORE

Wapack Labs has cataloged and reported on APT groups and campaigns in the past. An archive of related reporting can be found in the Red Sky Alliance portal. 

CVE-2017-12615

Wapack labs observed a recent Common Vulnerabilities and Exploit (CVE), CVE-2017-12615, being discussed in a Romanian hacker forum. A moderator on the forum posted an explanation of the exploit, a link to the National Vulnerability Database, and a GitHub link documenting how to weaponize the exploit in the Metasploit-framework. CVE-2017-12615 is assessed with a high severity rating (8.1/10) as it allows an attacker unauthorized modification to Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled. HTTP PUT places a file or resource at a specific URI, and exactly at that URI. If there is already a file or resource at that URI, PUT replaces that file or resource. If there is no file or resource there, PUT will create one. PUT is idempotent, but, paradoxically, PUT responses are not cacheable. Successful exploitation enables an attacker to upload a JSP file, request the file and execute its contents to gain remote access to the system. Wapack Labs is providing this report to Red Sky Alliance members for situation awareness. With the CVE and methods being posted in the wild, hackers may be more likely to attempt this attack. Wapack Labs recommends all Red Sky Members who use Apache Tomcat apply a security update and ask their Red Team members to test network assets to ensure the patch updated correctly...READ MORE

Wapack Labs has cataloged and reported CVEs in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

Monday, October 16, 2017

Attacker TTP: Discord Chat Application

On 12 October 2017, Wapack Labs observed underground conversations regarding Discord, a new communication method which is gaining popularity among hackers. Discord is a chat and voice-over-IP (VoIP) application designed for gamers to use with teammates, and rivals other providers in the gamer market, including TeamSpeak and Ventrilo. Discord provides services for free with plans to monetize additional content such as chat application skins, emoticons, stickers, etc., in the future. Discord's ease of use, along with the fact that it is available for free, has drawn attention from novice hackers. This new complimentary communication method does not appear to replace forums, IRC, Jabber, or any other previous platforms. Various underground forum and image boards have begun to set up Discord servers for member chat functions, in addition to the usual offerings of IRC, Tor, Jabber, and E-Mail. Discord allows both voice and textual chats. Discord seems to be a current and affordable option for gamers, but with further sophistication, could develop into a viable communication channel for hackers...READ MORE

Wapack Labs has cataloged and reported dark web communication channels in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

UPDATE - Indian Physical Security Company Compromise

Oct 14, 2017

On July 15, 2017, Wapack Labs identified, with high confidence, multiple keylogged, compromised email accounts belonging to an Indian physical security company. These email accounts were used to collect information from multiple internal systems and several external.

UPDATE  Oct 14, 2017 - Since that initial notification in July, Wapack Labs has over 1500 new records in Cyber Threat Analysis Center (CTAC) intelligence collections, showing keylogger activities not only collecting data from the company's email system, but also accessing their Customer Relationship Management system, allowing potential targeting of the company's customers, including the Indian Oil and Coal Etender sites, Nuclear Power Company of India and others.

The company was notified of the breach in July, and again in October, with no response.

Companies cited in this report include:
  • IndianOil Etenders – a contracting site for Indian Oil (https://iocletenders.gov.in/nicgep/app)
  • MSTC METAL - A virtual 'online' market place for purchase of Steel, Ferrous/Non-Ferrous Finished/Semi Finished products on fixed price basis.
  • Coal India Etenders - The eProcurement System of Coal India Limited: https://coalindiatenders.nic.in/nicgep/app
  • Borat Oman Refineries: Procurement site: https://etender.borl.in/BORL
  • Larsen & Toubro: Construction and engineering in the energy industry
  • Hindustan Unilever, LTD: The Indian wing of the Multinational consumer goods company Lever International
  • Samsung CNT
  • Lupin Pharmaceuticals: Lupin Pharmaceuticals, Inc. is the U.S. wholly owned subsidiary of Lupin Limited, which is among the top five pharmaceutical companies in India with sales and marketing headquarters in Baltimore, MD.[2]
  • NTPC:  “India’s leading Oil and Petroleum company”[3]
  • Hindustan Petrolium
  • Blue Star “India’s leading air conditioning and commercial refrigeration”[4]
  • Nuclear Power Company of India
  • Rashtriya Chemicals and Fertilizers
  • The Indian Navy
  • Asian Paints
  • Siddhi Vinayak Logistics
  • Royal Moving Transportation


[1] Wikipedia
[2] Wikipedia
[3] http://www.ntpc.co.in
[4] bluestarindia.com
____________________________________________________________________________
The full report may be purchased at:

Thursday, October 12, 2017

Carding Shop in Possession of Stolen Credit Cards

The administrator of a dark web carding shop may be in possession of stolen credit cards from the recent Sonic breach, and is advertising carding services on numerous carding forums. On 28 September 2017, the shop posted a dump of five million credit cards - mostly US. Analysts believe with moderate confidence that all the data from this dump may be from the recent Sonic breach, and two unknown buyers (high confidence) recently purchased some of these cards. Wapack Labs believes with moderate confidence that the administrator may not be the culprit of the breach, but is the seller of the stolen information. This is due to a feature that allows members to sell stolen cards to the shop. Wapack Labs will continue to monitor the forum and persona to identify the threat actor...READ MORE

Wapack Labs has cataloged and reported carding shops and stolen credit card dumps in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Tuesday, October 10, 2017

8chan Vs. Anonymous

On 4 October 2017, Wapack Analysts observed a post made to 8chan’s image board with a link to a raid against Anonymous on the "insurgency" board. Raids are commonly organized on image boards and are the act of harassing an organization by means of exposing one’s personal information (doxing), SWATing, hacking, spamming, prank phone calling, and other forms of remote harassment. The raid organizers claim that they are sick of the Anonymous movement and that hacktivists are a bunch of annoying Social Justice Warriors (SJW). The term SJW is very common derogatory slang among image board users, directed at individuals who fight strongly for a cause. Several doxes of Anonymous members have been posted, but still need to be verified. Alternative communication sources for the raid, such as IRC and Discord, were once active, but currently are not. The raid started in June and is still active on 8chan’s "insurgency" board, but alternative communication sources are no longer active, suggesting the raid is dying down in popularity and will likely soon end. Wapack Labs Analysts will continue to monitor 8chan’s cyber operations, conducted against Anonymous, for any potential implications to our subscribers...READ MORE

Wapack Labs has cataloged and reported image boards and activity involving Anonymous in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Auto-Update Malware Delivery TTP

TLP AMBER ANNOUNCEMENT: 

Malicious Microsoft Word documents are one of the most prevalent malware delivery mechanisms, and typically use embedded Visual Basic (VBA) macros to download and install malware on a victim’s machine. In late August and September 2017, Wapack Labs observed an uptick in an alternative Word doc based malware delivery method being leveraged in malicious email campaigns. The tactic involves using auto-updating links, instead of macros, to download additional malware payloads. Due to the prevalence of Office-based malware delivery, this new method will likely affect multiple industries, including Red Sky Alliance members. This report provides analysis on related specimens, including common artifacts and observed campaigns, as well as a generic mitigation that detects most variants...READ MORE

Wapack Labs has cataloged and reported malware delivery tactics in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

This TLP AMBER report is available only to Red Sky Alliance members.

Tor Network Shrinking

On 5 October 2017, Wapack Analysts observed several prominent Tor-based hacker forums go permanently offline - at the same time. Despite the clearweb address being offline, one of the forum's Tor onion sites was still online, suggesting a potential infiltration of the server; as seen with past law enforcement activities. The forums went offline with out any announcement or reason given for the disappearance. Several Reddit users have re-circulated the onion sites and are now speculating about what happened. In a recent blog post by Gizmodo, they explain that the Tor network is statistically shrinking. Gizmodo, utilizing the Onionscan tool, scanned a list of over 30,000 onion domains and reported only 4,400 online. Wapack Analysts have not observed any new Tor-based hacking forums for more than a week, suggesting possibly, a move away from Tor and on to different channels of communication...READ MORE

Wapack Labs has cataloged and reported Tor network activity and trends in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Monday, October 2, 2017

Browser-Side JavaScript Miners Affect Computer Performance

Browser-side mining of cryptocurrencies, which uses parallel processing CPU power for profit, was developed in the 2011-2014 time-frame. In September 2017, it was distinguished as part of malicious campaigns. Some content providers test this technology as a way to monetize their traffic. The SafeBrowse Chrome extension was allegedly hacked to include a mining functionality. These mining scripts pose a moderate cyber threat, as they significantly slow down the computer while the page is open in the browser. Detecting these malvertising campaigns and disabling mining scripts is advised...READ MORE

Wapack Labs has cataloged and reported extensively on mining cryptocurrencies in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Monday, September 25, 2017

Aeronautical Phishing Campaign Targets Transportation

TLP AMBER ANNOUNCEMENT:

Several email accounts were identified as part of an apparently unsuccessful phishing attack on several transportation related organizations. These email addresses were targeted in a phishing campaign, but the intended victims did not receive the phishing message due to a rate limit on the attacker’s email account. While the phishing message body was not observed, the subject line of the message was “Court Notice,” indicating the lure to be legal themed. The unsuccessful phishing attack took place on 15 January 2017. Monitoring of the keylogger data is ongoing, however, Wapack Labs has no further information at this time...READ MORE

Wapack Labs has cataloged and reported phishing attacks and credential theft in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

This TLP AMBER report is available only to Red Sky Alliance members.

New Tor Forum Recruiting Members

On 21 September 2017, Wapack labs observed a new tor based forum. The discovery was made while monitoring another space where members post and review dark web markets. The forum is recently new and has three main discussion sections within the forum: Drugs, Fraud, and General. With the forum recently opening for registration, the number of members is likely to grow. If members from other forums have migrated to the new forum, it has potential to become a reliable replacement market on the dark web. Wapack Labs will monitor the new forum and report on any activities affecting Red Sky Alliance members...READ MORE 

Wapack Labs has cataloged and reported extensively on Tor forums and markets in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

TOR "Skimmer Shop"


On 20 September 2017, Wapack Labs observed a Tor site selling a variety of credit card skimming devices. The owners of the Tor site claim to produce and modify all the products in their own workshops, which are purported to be located in the U.S. and Europe. The website states the business began in early 2015 and now consists of eleven (11) technically trained employees. The skimmer shop sells a variety of skimmers based on the shopper’s interests. The website presents various skimmer sections: ATM, gas pump, GSM (Global System for Mobile communication) receivers, POS, RFID, readers, and other skimmer accessories. Prices range from $800.00 USD to $1800.00 USD, depending on the skimmer wanted. Wapack Labs will continue to monitor this dark net skimmer shop in attempt to identify and monitor the threat actors and their activities...READ MORE

Wapack Labs has cataloged and reported extensively on Tor network shops in the past. An archive of related reporting can be found in the Red Sky Alliance portal.

WWW.WAPACKLABS.COM

Rogue Money Shredders

On 15 September 2017, Wapack Labs observed a new Tor onion involving rogue, foreign money shredders. They claim to be apart of a large network of shredders who devalue Swiss Franc currency by re-circulating, or converting, the Francs into other currencies: U.S. Dollars (USD), Euro (EUR), and the British Pound (GBP). The hard currency that is to be shredded must be deteriorated, have holes, or is a beyond a specific date - laundering only small amounts at a time. In order to procure the cash, they claim to use anonymous bitcoin bribes and violent threats. They state that the currency used is legitimate and legal; warning counterfeit currency is illegal. The legitimacy of their hard currency product(s) is unknown. Wapack Labs will continue to research the groups' capabilities and attempt to identify the actors involved in this currency operation...READ MORE

Wapack Labs has cataloged and reported extensively on Tor forums and money laundering in the past. An archive of related reporting can be found in the Red Sky Alliance portal.